Klik op een omslag om naar Google Boeken te gaan.
Bezig met laden... The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networksdoor Susan Young
Geen Bezig met laden...
Meld je aan bij LibraryThing om erachter te komen of je dit boek goed zult vinden. Op dit moment geen Discussie gesprekken over dit boek. Geen besprekingen geen besprekingen | voeg een bespreking toe
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. Geen bibliotheekbeschrijvingen gevonden. |
Actuele discussiesGeen
Google Books — Bezig met laden... GenresDewey Decimale Classificatie (DDC)005.8Information Computing and Information Computer programming, programs, data, security Computer SecurityLC-classificatieWaarderingGemiddelde:
Ben jij dit?Word een LibraryThing Auteur. |